Hitachi Replacing Car Keys With Finger-Vein Scanner
Biometric device could also could be used to log in to PCs and ATMs
Computerworld - Tired of hunting for your car keys?
If you are, researchers at Hitachi Ltd. just might be working on something just for you.
The Tokyo-based company is developing a biometric device that would identify a driver by reading the veins in his fingers. Each finger could authorize something different, according to Hitachi. For instance, one finger could authorize the driver to start the car, another finger could be scanned to adjust the seat or mirror, and yet another finger could authorize the payment for a hamburger at a drive-through.
The company would not divulge how soon the technology might be fitted into automobiles coming off the production line. However a spokesman did say that Hitachi is working to commercialize the biometric technology and that it will start with the automotive industry.
The finger-vein reader, similar to the more well-known fingerprint reader, works by matching up the veins in the driver's finger to corresponding information stored in the device's database. The scanner reads the finger-vein pattern by passing light through the finger.
Hitachi noted in a release that its engineers have been researching ways to use biometric authentication technology to replace traditional keys since 1997. In 2005, researchers developed a finger-vein authentication technology that allowed a door to be opened simply by gripping the handle.
The company is planning on using the same kind of technology for building access, PC log-in and automated teller machine authorization.
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!